dc.contributor.author | Sarrafpour, Bahman | |
dc.contributor.author | Abbaro, C. | |
dc.contributor.author | Pitton, I. | |
dc.contributor.author | Young, C. | |
dc.contributor.author | Madipour, Farhad | |
dc.date.accessioned | 2017-05-25T21:46:45Z | |
dc.date.available | 2017-05-25T21:46:45Z | |
dc.date.issued | 2016-12-14 | |
dc.identifier.uri | https://hdl.handle.net/10652/3747 | |
dc.description.abstract | Denial of Service (DoS) attacks are a type of interruption (malicious and/or unintended) that restrict or completely deny services meant for legitimate users. One of the most relevant DoS attacks is Distributed Denial of Service (DDoS) attack which is a variant of DoS, but on a larger scale using previously compromised, malware infected computers known as “bots” or “zombies”. DDoS attack occurs by generating large amounts of traffic towards an intended victim.
This paper focuses on analyzing a variant of DDoS attacks known as Network Time Protocol (NTP) Distributed Reflective Denial of Service (DRDoS) attack. The impact of the attack will be measured in the utilization of processor, memory, network and ping of most relevant devices. Further focus is on the host and network based layered “defense indepth” of NTP DRDoS attack mitigation techniques. | en_NZ |
dc.language.iso | en | en_NZ |
dc.rights | All rights reserved | en_NZ |
dc.subject | Distributed Denial of Service (DDoS) | en_NZ |
dc.subject | network security | en_NZ |
dc.subject | computer security | en_NZ |
dc.subject | Network Time Protocol (NTP) | en_NZ |
dc.title | Analysis of NTP DRDoS attacks’ performance effects and mitigation techniques | en_NZ |
dc.type | Conference Contribution - Oral Presentation | en_NZ |
dc.date.updated | 2017-05-10T05:35:42Z | |
dc.rights.holder | Authors | en_NZ |
dc.subject.marsden | 080303 Computer System Security | en_NZ |
dc.identifier.bibliographicCitation | Sassani (Sarrafpour), B. A., Abbaro, C., Pitton, I., Young, C., & Mehdipour, F. (2016, December). Analysis of NTP DRDoS Attacks’ Performance Effects and Mitigation Techniques. Paper presented at 14th Privacy, Security, and Trust Annual Conference, Auckland, New Zealand. | en_NZ |
unitec.publication.title | Privacy, Security, and Trust Conference | en_NZ |
unitec.conference.title | 14th Privacy, Security, and Trust Annual Conference 2016 (PST 2016) | en_NZ |
unitec.conference.org | Privacy, Security, and Trust | en_NZ |
unitec.conference.org | Unitec Institute of Technology | en_NZ |
unitec.conference.org | Institute of Electrical and Electronics Engineers (IEEE) | en_NZ |
unitec.conference.location | Auckland, New Zealand | en_NZ |
unitec.conference.sdate | 2016-12-12 | |
unitec.conference.edate | 2016-12-14 | |
unitec.peerreviewed | yes | en_NZ |
dc.contributor.affiliation | Unitec Institute of Technology | en_NZ |
dc.contributor.affiliation | Tech Futures Lab (Auckland, N.Z.) | en_NZ |
unitec.identifier.roms | 59771 | en_NZ |
unitec.institution.studyarea | Computing | |